Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Computer Applications
1001-9081
2005 Issue 7
Reduction and improvement of TCP protocol based on μC/OS II
FU Xue-jin;BAO Ke-jin
..............page:1520-1522
Extension and implementation of 802.1X protocol for switch
CAO Hua-wei;YIN Zhi-ben
..............page:1517-1519
Fast retrieval of JPEG images compressed by DCT
BIAN Guo-chun;ZHANG Xi-huang
..............page:1623-1625
Lifting-schemed line-based wavelet image compression
ZHANG Hong-wei;LIU Zheng-guang;CHEN Hong-xin
..............page:1626-1628
Automatic analysis system of Chinese characters structure based on image understanding
CHEN Liang-Yu;ZENG Zhen-bing;ZHANG Wen-Yin
..............page:1629-1631
Text feature selection method based on pattern clustering and genetic algorithm
HAO Zhan-gang;WANG Zheng-ou
..............page:1632-1633,1637
Text categorization rule extraction based on fuzzy decision tree
WANG Yu;WANG Zheng-ou
..............page:1634-1637
Agent negotiation model based on neural networks in electronic commerce
LU Wu-chang;HU Shan-li
..............page:1638-1640,1650
Solving frequency assignment problem using an adaptive multiple-colony ant algorithm
ZHANG Chun-fang;CHEN Ling;CHEN Juan
..............page:1641-1644
Predictive model of semiconductor manufacturing line based on RBF neural network
WANG Ling-qun;PAN Shi-zhu;ZHENG Ying-ping
..............page:1645-1646,1653
Fault diagnosis design based on qualitative constraint
SHAO Chen-xi;ZHANG Jun-tao;BAI Fang-zhou;ZHANG Yi
..............page:1647-1650
Does DiffServ work well in wireless ad hoc networks?
WANG Yu-ling;LI Yun;ZHAO Wei-liang;LIU Zhan-jun
..............page:1523-1525
Research on the techniques of security events correlation
GAO Lei;XIAO Zheng;WEI Wei;SUN Yun-ning
..............page:1526-1528,1539
Research and design of Windows firewall driver based on hook
XIAN Ji-qing;TAN Dan;CHEN Hui
..............page:1529-1530,1534
DDoS defense system based on aggregated traffic pushback
LI Xiao-ning
..............page:1531-1534
Attack model and its application based on system states aggregation
LAI Hai-Guang;HUANG Hao;XIE Jun-yuan
..............page:1535-1539
Automatic extraction of Internet worm signature based on common feature set
LI Zhi-dong;YUN Xiao-Chun;YANG Wu;XIN Yi
..............page:1540-1542
New encryption scheme of RSA with multi-recipient
LI Xiao-feng;LU Jian-zhu
..............page:1543-1544
New certified E-mail protocol
WANG Cai-fen;YU Cheng-zun;LIU Jun-long;JIA Ai-ku
..............page:1545-1547,1550
Promela modeling and analysis for security protocol
LONG Shi-Gong;WANG Qiao-li;LI Xiang
..............page:1548-1550
Network intrusion detection based on multi-class support vector machine
LI Jian;FAN Wan-chun;He Chi
..............page:1551-1553,1561
Ontology based cooperative intrusion detection system
CHEN Gang;CHEN Wei
..............page:1554-1557
Design and realization of vulnerability testing system by imitating attack
YANG Kuo-zhao;JIANG Fan
..............page:1562-1564,1567
Design and formal description of security policy coordination for heterogeneous information systems
HAN Zhi-yong;WANG Ping;NI Yong;LI Xian-guo
..............page:1565-1567
Role representation and contradiction redundancy treatment of RBAC-based information grid
YANG Ning;XU Zhi-wei;ZHOU Hao-jie
..............page:1568-1569,1583
Multi-level document clustering algorithm based on association rules
SONG Jiang-chun;SHEN Jun-yi;SONG Qing-bao
..............page:1570-1572
Research and realization of an efficient clustering algorithm
ZHANG Yong-mei;HAN Yan;ZHANG Jian-hua
..............page:1573-1576,1579
Fast algorithm for mining association rules based on relationship matrix
HU Hui-rong;WANG Zhou-jing
..............page:1577-1579
Web robot detection algorithm based on episode analysis
GUO Wei-gang;JU Shi-Guang
..............page:1580-1583
Study and application of time-interval sequential pattern to equipment fault monitoring
YAN Wei;ZHANG Hao;LU Jian-feng
..............page:1584-1586
CoSDE:spatial database engine of VegaGIS
HE Xiong;FANG Jin-yun;TANG Zhi-Min
..............page:1587-1589,1619
Storage strategy of spatial metadata based on XML data reduced schema
ZHANG Tao;YU Xue-qin
..............page:1590-1591,1597
Head-signed congestion control algorithm based on ECN and priority
LI Hong-chun;LIU Qun;CONG Yan-qi;LIU Xiao-jian
..............page:1514-1516
A multi-resources load-balancing algorithm
LIU Ke-jian;LIU Xin-Song;WU Ai
..............page:1512-1513,1516
Effective multicast model based on hierarchical P2P overlay network
CUI Xiao-yuan;SUN Xue-jun;YANG Yong-huo;HE Pi-lian
..............page:1509-1511
Map-based BitSet association rule mining of remote sensing image
HUANG Duan-qiong;CHEN Chong-cheng;HUANG Hong-yu;FAN Ming-hui
..............page:1592-1594
Risk analysis of information system based on variable precision rough set
XIAO Long;DAI Zong-kun;YANG Wei
..............page:1595-1597
Research on ROI image coding based on human visual specialties
Liang Ya-ling;YANG Chun-ling;Yu Ying-lin
..............page:1598-1601
Linear control and prediction of fractal coding time
CHEN Zuo-ping;YE Zheng-lin;ZHENG Sheng-chao
..............page:1602-1604,1628
Planar pattern tracking and its application in augmented reality
LIU Guo-yi;LI Hua
..............page:1605-1607,1615
Face recognition based on mixed feature of ICA in PCA residual face space
WU Yan;SONG Jin-jing
..............page:1608-1610,1631
QoS multicast routing algorithm based on hybrid genetic algorithm
CHEN Nian-sheng;LI La-yuan;DONG Wu-shi
..............page:1485-1487,1497
Pervasive computing:human-centered computing
SHI Wei-ren;ZHOU Bin;XU Lei
..............page:1479-1484
On computer networks and grid service
ZENG Hua-shen;LI Ji;FENG Lin;GONG Xun
..............page:1475-1478
An efficient algorithm of facial expression generation based on RBF network
YU Zhong-ji;LI Ji-jun
..............page:1611-1615
Video segmentation method based on mixture probabilistic background model
LIU Zhen;Zhao Jie-yu
..............page:1616-1619
An edge-preserving image fusion algorithm based on wavelet transform
LIU Peng;ZHANG Yan;MAO Zhi-gang
..............page:1620-1622
A fast image matching method based on PBIL algorithm
SONG Xiao-yu;Liu Yun-peng;WANG Yong-hui
..............page:1651-1653
Mining user navigation pattern using incremental ant colony clustering
SHEN Jie;LIN Ying;CHEN Zhi-min;ZHAO Min-ya
..............page:1654-1657,1660
Differentia-driven case revise strategy in case-based reasoning
ZHANG Guang-qian;DENG Gui-shi
..............page:1658-1660
Multilayer feed-forward neural networks based on immune genetic algorithm
LUO Fei;HE Ming-yi
..............page:1661-1662,1665
Classification of "non-self" based on system call sequence
LI Zhen;WANG Feng-xian
..............page:1663-1665
Design and implementation of a reflexive workflow model
XIE Bao-ning;TAN Qing-ping;LUO Meng
..............page:1666-1669,1673
Design and implementation of development framework for human-oriented workflow management system
ZHOU Yao-yu;LIU Qiang;ZHAO Ming-Yang
..............page:1670-1673
A method of object code verification for debugging compiler
JU Xiao-ming;YAO Qing-dong
..............page:1674-1675,1694
Data compression algorithms based on wavelet transforming for sensor networks
WANG Lei;ZHOU Si-wang;CHEN Zhi-ping;LIN Ya-ping
..............page:1676-1678,1681
Real-time performance test and analysis of Linux
LI Jiang;DAI Sheng-hua
..............page:1679-1681
Large scale software distribution technology based on HTTP protocol
ZHANG Xiao-feng
..............page:1682-1684
SIP-based inter-domain network conference system
SHAN Lin-wei;SHAN Xiu-ming;REN Yong
..............page:1685-1687,1706
Design and implementation of a prototype system of TURN server
LI Hong-bin;YANG Xue-hua;LEI Wei-min
..............page:1688-1691,1715
ARM emulator design based on Ethernet interface
HE Hui-qin;HUANG Guang-ming;ZHANG He-ping;ZHANG Zhi-sheng
..............page:1692-1694
Design and realization of IP address takeover of high available system based on Linux
WANG Guo-hao;CHEN Wen-zhi;SHI Jiao-ying
..............page:1695-1697,1710
DVB-CI device driver development on embedded Linux system
ZHOU Qing-xi;LIU Qiang
..............page:1698-1700
Situation plotting and displaying in virtual battle environment
Chen Jian-xiang;WEI Ying-mei;WU Ling-Da
..............page:1701-1703
Optimizing strategies for search engines based on PageRank algorithm
ZHANG Wei;LI Zhi-shu
..............page:1711-1712,1718
Automatic detection of online duplication documents and its application in enterprise data warehouse
BAI Guang-hui;LIAN Hao;LIU Yue;CHENG Xue-Qi
..............page:1713-1715
Intelligent treatment of converting Chinese name to the first letter of spelling
TU Jin-de;LI Yong-ping
..............page:1716-1718
Pure end-to-end TCP approaches in wireless network
CHEN Zuo-tian;ZHOU Jin-fang;CHEN Kang-sheng
..............page:1506-1508
Dynamic addressing in mobile ad hoc networks
ZHANG Zhi;DAI Guan-zhong;CHEN Wu;ZHAO Yu-ting
..............page:1502-1505,1508
Larger-traffic-first packet marking for real-time IP traceback
LI Qiang;ZHU Hong-zi;JU Jiu-bin
..............page:1498-1501
Research on path matrix based on regression model
SHANG Feng-jun;PAN Ying-jun;TANG Hong
..............page:1494-1497
CIOQ-based variable packet switches
ZHANG Shu-qi;JIA Shu-heng
..............page:1491-1493
Implementing distributed DRR scheduling algorithm in CICQ switches
WANG Rong;CHEN Yue
..............page:1488-1490,1493